Vulnerability Note VU#160027
Broadcom BCM4325 and BCM4329 wireless chipset denial-of-service vulnerability
Broadcom BCM4325 and BCM4329 wireless chipsets have been reported to contain an out-of-bounds read error condition that may be exploited to produce a denial-of-service condition.
The CORE Security Technologies advisory states:
"An out-of-bounds read error condition exists in broadcom's BCM4325 and BCM4329 combo solutions firmware. This error can be leveraged to denial of service attack, and possibly information disclosure. An attacker can send a RSN (802.11i) information element, that causes the WiFi NIC to stop responding."
The vast majority of Broadcom's WLAN product portfolio is not subject to the DoS issue, including as examples:
Broadcom has been working with multiple customers providing information and fixes as required, and will continue to address security issues that may be identified."
A remote attacker may be able to cause a denial-of-service condition against the WiFi network interface card.
Apply an Update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Inc.||Affected||22 Aug 2012||28 Jan 2013|
|Broadcom||Affected||22 Aug 2012||23 Oct 2012|
|HTC||Affected||22 Aug 2012||23 Oct 2012|
|Motorola, Inc.||Unknown||22 Aug 2012||22 Aug 2012|
|Nokia||Unknown||22 Aug 2012||22 Aug 2012|
|Sony Corporation||Unknown||22 Aug 2012||22 Aug 2012|
CVSS Metrics (Learn More)
Thanks to Andres Blanco and Matias Eissler for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2012-2619
- Date Public: 23 Oct 2012
- Date First Published: 23 Oct 2012
- Date Last Updated: 28 Jan 2013
- Document Revision: 31
If you have feedback, comments, or additional information about this vulnerability, please send us email.